15/05/11 18:47:41 ii : ipc client process thread begin ... 15/05/11 18:47:41 10.90.3.25:500 15/05/11 18:47:41 DB : 9df94f78a0172701:0000000000000000 15/05/11 18:47:41 DB : phase1 added ( obj count = 1 ) 15/05/11 18:47:41 >> : security association payload 15/05/11 18:47:41 >> : - proposal #1 payload 15/05/11 18:47:41 >> : -- transform #1 payload 15/05/11 18:47:41 >> : key exchange payload 15/05/11 18:47:41 >> : nonce payload 15/05/11 18:47:41 >> : identification payload 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local supports XAUTH 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local supports nat-t ( draft v00 ) 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local supports nat-t ( draft v01 ) 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local supports nat-t ( draft v02 ) 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local supports nat-t ( draft v03 ) 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local supports nat-t ( rfc ) 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local supports DPDv1 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local is SHREW SOFT compatible 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local is NETSCREEN compatible 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local is SIDEWINDER compatible 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local is CISCO UNITY compatible 15/05/11 18:47:41 >> : vendor id payload 15/05/11 18:47:41 ii : local is CHECKPOINT compatible 15/05/11 18:47:41 >= : cookies 9df94f78a0172701:0000000000000000 15/05/11 18:47:41 >= : message 00000000 15/05/11 18:47:41 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 571 bytes ) 15/05/11 18:47:41 DB : phase1 resend event scheduled ( ref count = 2 ) 15/05/11 18:47:51 -> : resend 1 phase1 packet(s) [0/2] 10.90.3.53:500 -> 10.90.3.25:500 15/05/11 18:47:52 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 380 bytes ) 15/05/11 18:47:52 DB : phase1 found 15/05/11 18:47:52 ii : processing phase1 packet ( 380 bytes ) 15/05/11 18:47:52 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 =< : message 00000000 15/05/11 18:47:52 << : security association payload 15/05/11 18:47:52 << : - propsal #1 payload 15/05/11 18:47:52 << : -- transform #1 payload 15/05/11 18:47:52 ii : matched isakmp proposal #1 transform #1 15/05/11 18:47:52 ii : - transform = ike 15/05/11 18:47:52 ii : - cipher type = 3des 15/05/11 18:47:52 ii : - key length = default 15/05/11 18:47:52 ii : - hash type = md5 15/05/11 18:47:52 ii : - dh group = group2 ( modp-1024 ) 15/05/11 18:47:52 ii : - auth type = xauth-initiator-psk 15/05/11 18:47:52 ii : - life seconds = 180 15/05/11 18:47:52 ii : - life kbytes = 0 15/05/11 18:47:52 << : key exchange payload 15/05/11 18:47:52 << : nonce payload 15/05/11 18:47:52 << : identification payload 15/05/11 18:47:52 ii : phase1 id match ( natt prevents ip match ) 15/05/11 18:47:52 ii : received = ipv4-host 10.90.3.25 15/05/11 18:47:52 << : hash payload 15/05/11 18:47:52 << : vendor id payload 15/05/11 18:47:52 ii : peer supports DPDv1 15/05/11 18:47:52 << : vendor id payload 15/05/11 18:47:52 ii : peer supports nat-t ( rfc ) 15/05/11 18:47:52 << : vendor id payload 15/05/11 18:47:52 ii : unknown vendor id ( 28 bytes ) 15/05/11 18:47:52 0x : 69936922 8741c6d4 ca094c93 e242c9de 19e7b7c6 00000005 00000500 15/05/11 18:47:52 << : nat discovery payload 15/05/11 18:47:52 << : nat discovery payload 15/05/11 18:47:52 ii : disabled nat-t ( no nat detected ) 15/05/11 18:47:52 == : DH shared secret ( 128 bytes ) 15/05/11 18:47:52 == : SETKEYID ( 16 bytes ) 15/05/11 18:47:52 == : SETKEYID_d ( 16 bytes ) 15/05/11 18:47:52 == : SETKEYID_a ( 16 bytes ) 15/05/11 18:47:52 == : SETKEYID_e ( 16 bytes ) 15/05/11 18:47:52 == : cipher key ( 32 bytes ) 15/05/11 18:47:52 == : cipher iv ( 8 bytes ) 15/05/11 18:47:52 == : phase1 hash_i ( computed ) ( 16 bytes ) 15/05/11 18:47:52 >> : hash payload 15/05/11 18:47:52 >> : nat discovery payload 15/05/11 18:47:52 >> : nat discovery payload 15/05/11 18:47:52 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 >= : message 00000000 15/05/11 18:47:52 >= : encrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : encrypt packet ( 88 bytes ) 15/05/11 18:47:52 == : stored iv ( 8 bytes ) 15/05/11 18:47:52 DB : phase1 resend event canceled ( ref count = 1 ) 15/05/11 18:47:52 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 120 bytes ) 15/05/11 18:47:52 == : phase1 hash_r ( computed ) ( 16 bytes ) 15/05/11 18:47:52 == : phase1 hash_r ( received ) ( 16 bytes ) 15/05/11 18:47:52 ii : phase1 sa established 15/05/11 18:47:52 ii : 10.90.3.25:500 <-> 10.90.3.53:500 15/05/11 18:47:52 ii : 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 ii : sending peer INITIAL-CONTACT notification 15/05/11 18:47:52 ii : - 10.90.3.53:500 -> 10.90.3.25:500 15/05/11 18:47:52 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 ii : - data size 0 15/05/11 18:47:52 >> : hash payload 15/05/11 18:47:52 >> : notification payload 15/05/11 18:47:52 == : new informational hash ( 16 bytes ) 15/05/11 18:47:52 == : new informational iv ( 8 bytes ) 15/05/11 18:47:52 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 >= : message 130e3f47 15/05/11 18:47:52 >= : encrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : encrypt packet ( 76 bytes ) 15/05/11 18:47:52 == : stored iv ( 8 bytes ) 15/05/11 18:47:52 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 104 bytes ) 15/05/11 18:47:52 DB : phase2 not found 15/05/11 18:47:52 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 68 bytes ) 15/05/11 18:47:52 DB : phase1 found 15/05/11 18:47:52 ii : processing config packet ( 68 bytes ) 15/05/11 18:47:52 DB : config not found 15/05/11 18:47:52 DB : config added ( obj count = 1 ) 15/05/11 18:47:52 == : new config iv ( 8 bytes ) 15/05/11 18:47:52 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 =< : message 8ba26573 15/05/11 18:47:52 =< : decrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : decrypt packet ( 68 bytes ) 15/05/11 18:47:52 <= : trimmed packet padding ( 4 bytes ) 15/05/11 18:47:52 <= : stored iv ( 8 bytes ) 15/05/11 18:47:52 << : hash payload 15/05/11 18:47:52 << : attribute payload 15/05/11 18:47:52 == : configure hash_i ( computed ) ( 16 bytes ) 15/05/11 18:47:52 == : configure hash_c ( computed ) ( 16 bytes ) 15/05/11 18:47:52 ii : configure hash verified 15/05/11 18:47:52 ii : - xauth username 15/05/11 18:47:52 ii : - xauth password 15/05/11 18:47:52 ii : received basic xauth request - 15/05/11 18:47:52 ii : - standard xauth username 15/05/11 18:47:52 ii : - standard xauth password 15/05/11 18:47:52 ii : sending xauth response for tepafray 15/05/11 18:47:52 >> : hash payload 15/05/11 18:47:52 >> : attribute payload 15/05/11 18:47:52 == : new configure hash ( 16 bytes ) 15/05/11 18:47:52 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 >= : message 8ba26573 15/05/11 18:47:52 >= : encrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : encrypt packet ( 83 bytes ) 15/05/11 18:47:52 == : stored iv ( 8 bytes ) 15/05/11 18:47:52 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 112 bytes ) 15/05/11 18:47:52 DB : config resend event scheduled ( ref count = 2 ) 15/05/11 18:47:52 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 60 bytes ) 15/05/11 18:47:52 DB : phase1 found 15/05/11 18:47:52 ii : processing config packet ( 60 bytes ) 15/05/11 18:47:52 DB : config found 15/05/11 18:47:52 == : new config iv ( 8 bytes ) 15/05/11 18:47:52 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 =< : message d59e912b 15/05/11 18:47:52 =< : decrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : decrypt packet ( 60 bytes ) 15/05/11 18:47:52 <= : stored iv ( 8 bytes ) 15/05/11 18:47:52 << : hash payload 15/05/11 18:47:52 << : attribute payload 15/05/11 18:47:52 == : configure hash_i ( computed ) ( 16 bytes ) 15/05/11 18:47:52 == : configure hash_c ( computed ) ( 16 bytes ) 15/05/11 18:47:52 ii : configure hash verified 15/05/11 18:47:52 ii : received xauth result - 15/05/11 18:47:52 ii : user tepafray authentication succeeded 15/05/11 18:47:52 ii : sending xauth acknowledge 15/05/11 18:47:52 >> : hash payload 15/05/11 18:47:52 >> : attribute payload 15/05/11 18:47:52 == : new configure hash ( 16 bytes ) 15/05/11 18:47:52 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 >= : message d59e912b 15/05/11 18:47:52 >= : encrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : encrypt packet ( 56 bytes ) 15/05/11 18:47:52 == : stored iv ( 8 bytes ) 15/05/11 18:47:52 DB : config resend event canceled ( ref count = 1 ) 15/05/11 18:47:52 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 88 bytes ) 15/05/11 18:47:52 DB : config resend event scheduled ( ref count = 2 ) 15/05/11 18:47:52 ii : building config attribute list 15/05/11 18:47:52 ii : - IP4 Address 15/05/11 18:47:52 ii : - Address Expiry 15/05/11 18:47:52 ii : - IP4 Netmask 15/05/11 18:47:52 ii : - IP4 DNS Server 15/05/11 18:47:52 ii : - IP4 WINS Server 15/05/11 18:47:52 ii : sending config push acknowledge 15/05/11 18:47:52 >> : hash payload 15/05/11 18:47:52 >> : attribute payload 15/05/11 18:47:52 == : new configure hash ( 16 bytes ) 15/05/11 18:47:52 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 >= : message d59e912b 15/05/11 18:47:52 >= : encrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : encrypt packet ( 76 bytes ) 15/05/11 18:47:52 == : stored iv ( 8 bytes ) 15/05/11 18:47:52 DB : config resend event canceled ( ref count = 1 ) 15/05/11 18:47:52 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 104 bytes ) 15/05/11 18:47:52 DB : config resend event scheduled ( ref count = 2 ) 15/05/11 18:47:52 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 18:47:52 DB : phase1 found 15/05/11 18:47:52 ii : processing config packet ( 92 bytes ) 15/05/11 18:47:52 DB : config found 15/05/11 18:47:52 == : new config iv ( 8 bytes ) 15/05/11 18:47:52 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 =< : message f664d9e2 15/05/11 18:47:52 =< : decrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : decrypt packet ( 92 bytes ) 15/05/11 18:47:52 <= : stored iv ( 8 bytes ) 15/05/11 18:47:52 << : hash payload 15/05/11 18:47:52 << : attribute payload 15/05/11 18:47:52 == : configure hash_i ( computed ) ( 16 bytes ) 15/05/11 18:47:52 == : configure hash_c ( computed ) ( 16 bytes ) 15/05/11 18:47:52 ii : configure hash verified 15/05/11 18:47:52 ii : received config push request 15/05/11 18:47:52 ii : - IP4 Address = 44.128.0.11 15/05/11 18:47:52 ii : - IP4 Netmask = 255.255.255.255 15/05/11 18:47:52 ii : - IP4 DNS Server = 8.8.8.8 15/05/11 18:47:52 ii : - IP4 Subnet 15/05/11 18:47:52 DB : config resend event canceled ( ref count = 1 ) 15/05/11 18:47:52 ii : opened tap device tap0 15/05/11 18:47:52 ii : configured adapter tap0 15/05/11 18:47:52 ii : generating IPSEC security policies at REQUIRE level 15/05/11 18:47:52 ii : creating NONE INBOUND policy ANY:10.90.3.25:* -> ANY:10.90.3.53:* 15/05/11 18:47:52 DB : policy added ( obj count = 5 ) 15/05/11 18:47:52 K> : send pfkey X_SPDADD UNSPEC message 15/05/11 18:47:52 K< : recv pfkey X_SPDADD UNSPEC message 15/05/11 18:47:52 DB : policy found 15/05/11 18:47:52 ii : creating NONE OUTBOUND policy ANY:10.90.3.53:* -> ANY:10.90.3.25:* 15/05/11 18:47:52 ii : created NONE policy route for 10.90.3.25/32 15/05/11 18:47:52 DB : policy added ( obj count = 6 ) 15/05/11 18:47:52 K> : send pfkey X_SPDADD UNSPEC message 15/05/11 18:47:52 ii : creating IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:44.128.0.11:* 15/05/11 18:47:52 DB : policy added ( obj count = 7 ) 15/05/11 18:47:52 K> : send pfkey X_SPDADD UNSPEC message 15/05/11 18:47:52 K< : recv pfkey X_SPDADD UNSPEC message 15/05/11 18:47:52 DB : policy found 15/05/11 18:47:52 ii : calling init phase2 for nailed policy 15/05/11 18:47:52 DB : policy found 15/05/11 18:47:52 ii : creating IPSEC OUTBOUND policy ANY:44.128.0.11:* -> ANY:0.0.0.0/0:* 15/05/11 18:47:52 DB : policy not found 15/05/11 18:47:52 !! : unable to locate inbound policy for init phase2 15/05/11 18:47:52 K< : recv pfkey X_SPDADD UNSPEC message 15/05/11 18:47:52 DB : policy found 15/05/11 18:47:52 ii : created IPSEC policy route for 0.0.0.0 15/05/11 18:47:52 DB : policy added ( obj count = 8 ) 15/05/11 18:47:52 K> : send pfkey X_SPDADD UNSPEC message 15/05/11 18:47:52 K< : recv pfkey X_SPDADD UNSPEC message 15/05/11 18:47:52 DB : policy found 15/05/11 18:47:52 ii : calling init phase2 for nailed policy 15/05/11 18:47:52 DB : policy found 15/05/11 18:47:52 DB : policy found 15/05/11 18:47:52 DB : tunnel found 15/05/11 18:47:52 DB : new phase2 ( IPSEC initiator ) 15/05/11 18:47:52 DB : phase2 added ( obj count = 1 ) 15/05/11 18:47:52 K> : send pfkey GETSPI ESP message 15/05/11 18:47:52 K< : recv pfkey GETSPI ESP message 15/05/11 18:47:52 DB : phase2 found 15/05/11 18:47:52 ii : updated spi for 1 ipsec-esp proposal 15/05/11 18:47:52 DB : phase1 found 15/05/11 18:47:52 >> : hash payload 15/05/11 18:47:52 >> : security association payload 15/05/11 18:47:52 >> : - proposal #1 payload 15/05/11 18:47:52 >> : -- transform #1 payload 15/05/11 18:47:52 >> : nonce payload 15/05/11 18:47:52 >> : identification payload 15/05/11 18:47:52 >> : identification payload 15/05/11 18:47:52 == : phase2 hash_i ( input ) ( 112 bytes ) 15/05/11 18:47:52 == : phase2 hash_i ( computed ) ( 16 bytes ) 15/05/11 18:47:52 == : new phase2 iv ( 8 bytes ) 15/05/11 18:47:52 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 >= : message 7cee529e 15/05/11 18:47:52 >= : encrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : encrypt packet ( 156 bytes ) 15/05/11 18:47:52 == : stored iv ( 8 bytes ) 15/05/11 18:47:52 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 184 bytes ) 15/05/11 18:47:52 DB : phase2 resend event scheduled ( ref count = 2 ) 15/05/11 18:47:52 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 156 bytes ) 15/05/11 18:47:52 DB : phase1 found 15/05/11 18:47:52 ii : processing phase2 packet ( 156 bytes ) 15/05/11 18:47:52 DB : phase2 found 15/05/11 18:47:52 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 =< : message 7cee529e 15/05/11 18:47:52 =< : decrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : decrypt packet ( 156 bytes ) 15/05/11 18:47:52 <= : trimmed packet padding ( 4 bytes ) 15/05/11 18:47:52 <= : stored iv ( 8 bytes ) 15/05/11 18:47:52 << : hash payload 15/05/11 18:47:52 << : security association payload 15/05/11 18:47:52 << : - propsal #1 payload 15/05/11 18:47:52 << : -- transform #1 payload 15/05/11 18:47:52 << : nonce payload 15/05/11 18:47:52 << : identification payload 15/05/11 18:47:52 << : identification payload 15/05/11 18:47:52 == : phase2 hash_r ( input ) ( 128 bytes ) 15/05/11 18:47:52 == : phase2 hash_r ( computed ) ( 16 bytes ) 15/05/11 18:47:52 == : phase2 hash_r ( received ) ( 16 bytes ) 15/05/11 18:47:52 ii : matched ipsec-esp proposal #1 transform #1 15/05/11 18:47:52 ii : - transform = esp-aes 15/05/11 18:47:52 ii : - key length = 256 bits 15/05/11 18:47:52 ii : - encap mode = tunnel 15/05/11 18:47:52 ii : - msg auth = hmac-sha1 15/05/11 18:47:52 ii : - pfs dh group = none 15/05/11 18:47:52 ii : - life seconds = 28800 15/05/11 18:47:52 ii : - life kbytes = 0 15/05/11 18:47:52 DB : policy found 15/05/11 18:47:52 K> : send pfkey GETSPI ESP message 15/05/11 18:47:52 ii : phase2 ids accepted 15/05/11 18:47:52 ii : - loc ANY:44.128.0.11:* -> ANY:0.0.0.0/0:* 15/05/11 18:47:52 ii : - rmt ANY:0.0.0.0/0:* -> ANY:44.128.0.11:* 15/05/11 18:47:52 ii : phase2 sa established 15/05/11 18:47:52 ii : 10.90.3.53:500 <-> 10.90.3.25:500 15/05/11 18:47:52 == : phase2 hash_p ( input ) ( 41 bytes ) 15/05/11 18:47:52 == : phase2 hash_p ( computed ) ( 16 bytes ) 15/05/11 18:47:52 >> : hash payload 15/05/11 18:47:52 K< : recv pfkey GETSPI ESP message 15/05/11 18:47:52 DB : phase2 found 15/05/11 18:47:52 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:47:52 >= : message 7cee529e 15/05/11 18:47:52 >= : encrypt iv ( 8 bytes ) 15/05/11 18:47:52 == : encrypt packet ( 48 bytes ) 15/05/11 18:47:52 == : stored iv ( 8 bytes ) 15/05/11 18:47:52 DB : phase2 resend event canceled ( ref count = 1 ) 15/05/11 18:47:52 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 80 bytes ) 15/05/11 18:47:52 == : spi cipher key data ( 32 bytes ) 15/05/11 18:47:52 == : spi hmac key data ( 20 bytes ) 15/05/11 18:47:52 K> : send pfkey UPDATE ESP message 15/05/11 18:47:52 == : spi cipher key data ( 32 bytes ) 15/05/11 18:47:52 == : spi hmac key data ( 20 bytes ) 15/05/11 18:47:52 K< : recv pfkey UPDATE ESP message 15/05/11 18:47:52 K> : send pfkey UPDATE ESP message 15/05/11 18:47:52 K< : recv pfkey UPDATE ESP message 15/05/11 18:48:02 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 18:48:02 DB : phase1 found 15/05/11 18:48:02 ii : processing config packet ( 92 bytes ) 15/05/11 18:48:02 DB : config found 15/05/11 18:48:02 !! : config packet ignored ( config already mature ) 15/05/11 18:48:07 DB : phase1 found 15/05/11 18:48:07 ii : sending peer DPDV1-R-U-THERE notification 15/05/11 18:48:07 ii : - 10.90.3.53:500 -> 10.90.3.25:500 15/05/11 18:48:07 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:07 ii : - data size 4 15/05/11 18:48:07 >> : hash payload 15/05/11 18:48:07 >> : notification payload 15/05/11 18:48:07 == : new informational hash ( 16 bytes ) 15/05/11 18:48:07 == : new informational iv ( 8 bytes ) 15/05/11 18:48:07 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:07 >= : message c684e437 15/05/11 18:48:07 >= : encrypt iv ( 8 bytes ) 15/05/11 18:48:07 == : encrypt packet ( 80 bytes ) 15/05/11 18:48:07 == : stored iv ( 8 bytes ) 15/05/11 18:48:07 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 112 bytes ) 15/05/11 18:48:07 ii : DPD ARE-YOU-THERE sequence 37a1584b requested 15/05/11 18:48:07 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 84 bytes ) 15/05/11 18:48:07 DB : phase1 found 15/05/11 18:48:07 ii : processing informational packet ( 84 bytes ) 15/05/11 18:48:07 == : new informational iv ( 8 bytes ) 15/05/11 18:48:07 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:07 =< : message 00404c28 15/05/11 18:48:07 =< : decrypt iv ( 8 bytes ) 15/05/11 18:48:07 == : decrypt packet ( 84 bytes ) 15/05/11 18:48:07 <= : trimmed packet padding ( 4 bytes ) 15/05/11 18:48:07 <= : stored iv ( 8 bytes ) 15/05/11 18:48:07 << : hash payload 15/05/11 18:48:07 << : notification payload 15/05/11 18:48:07 == : informational hash_i ( computed ) ( 16 bytes ) 15/05/11 18:48:07 == : informational hash_c ( received ) ( 16 bytes ) 15/05/11 18:48:07 ii : informational hash verified 15/05/11 18:48:07 ii : received peer DPDV1-R-U-THERE-ACK notification 15/05/11 18:48:07 ii : - 10.90.3.25:500 -> 10.90.3.53:500 15/05/11 18:48:07 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:07 ii : - data size 4 15/05/11 18:48:07 ii : DPD ARE-YOU-THERE-ACK sequence 37a1584b accepted 15/05/11 18:48:07 ii : next tunnel DPD request in 15 secs for peer 10.90.3.25:500 15/05/11 18:48:12 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 18:48:12 DB : phase1 found 15/05/11 18:48:12 ii : processing config packet ( 92 bytes ) 15/05/11 18:48:12 DB : config found 15/05/11 18:48:12 !! : config packet ignored ( config already mature ) 15/05/11 18:48:22 DB : phase1 found 15/05/11 18:48:22 ii : sending peer DPDV1-R-U-THERE notification 15/05/11 18:48:22 ii : - 10.90.3.53:500 -> 10.90.3.25:500 15/05/11 18:48:22 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:22 ii : - data size 4 15/05/11 18:48:22 >> : hash payload 15/05/11 18:48:22 >> : notification payload 15/05/11 18:48:22 == : new informational hash ( 16 bytes ) 15/05/11 18:48:22 == : new informational iv ( 8 bytes ) 15/05/11 18:48:22 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:22 >= : message c556b3da 15/05/11 18:48:22 >= : encrypt iv ( 8 bytes ) 15/05/11 18:48:22 == : encrypt packet ( 80 bytes ) 15/05/11 18:48:22 == : stored iv ( 8 bytes ) 15/05/11 18:48:22 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 112 bytes ) 15/05/11 18:48:22 ii : DPD ARE-YOU-THERE sequence 37a1584c requested 15/05/11 18:48:22 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 84 bytes ) 15/05/11 18:48:22 DB : phase1 found 15/05/11 18:48:22 ii : processing informational packet ( 84 bytes ) 15/05/11 18:48:22 == : new informational iv ( 8 bytes ) 15/05/11 18:48:22 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:22 =< : message 9e1f3b4a 15/05/11 18:48:22 =< : decrypt iv ( 8 bytes ) 15/05/11 18:48:22 == : decrypt packet ( 84 bytes ) 15/05/11 18:48:22 <= : trimmed packet padding ( 4 bytes ) 15/05/11 18:48:22 <= : stored iv ( 8 bytes ) 15/05/11 18:48:22 << : hash payload 15/05/11 18:48:22 << : notification payload 15/05/11 18:48:22 == : informational hash_i ( computed ) ( 16 bytes ) 15/05/11 18:48:22 == : informational hash_c ( received ) ( 16 bytes ) 15/05/11 18:48:22 ii : informational hash verified 15/05/11 18:48:22 ii : received peer DPDV1-R-U-THERE-ACK notification 15/05/11 18:48:22 ii : - 10.90.3.25:500 -> 10.90.3.53:500 15/05/11 18:48:22 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:22 ii : - data size 4 15/05/11 18:48:22 ii : DPD ARE-YOU-THERE-ACK sequence 37a1584c accepted 15/05/11 18:48:22 ii : next tunnel DPD request in 15 secs for peer 10.90.3.25:500 15/05/11 18:48:22 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 18:48:22 DB : phase1 found 15/05/11 18:48:22 ii : processing config packet ( 92 bytes ) 15/05/11 18:48:22 DB : config found 15/05/11 18:48:22 !! : config packet ignored ( config already mature ) 15/05/11 18:48:32 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 18:48:32 DB : phase1 found 15/05/11 18:48:32 ii : processing config packet ( 92 bytes ) 15/05/11 18:48:32 DB : config found 15/05/11 18:48:32 !! : config packet ignored ( config already mature ) 15/05/11 18:48:37 DB : phase1 found 15/05/11 18:48:37 ii : sending peer DPDV1-R-U-THERE notification 15/05/11 18:48:37 ii : - 10.90.3.53:500 -> 10.90.3.25:500 15/05/11 18:48:37 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:37 ii : - data size 4 15/05/11 18:48:37 >> : hash payload 15/05/11 18:48:37 >> : notification payload 15/05/11 18:48:37 == : new informational hash ( 16 bytes ) 15/05/11 18:48:37 == : new informational iv ( 8 bytes ) 15/05/11 18:48:37 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:37 >= : message ce6a9a54 15/05/11 18:48:37 >= : encrypt iv ( 8 bytes ) 15/05/11 18:48:37 == : encrypt packet ( 80 bytes ) 15/05/11 18:48:37 == : stored iv ( 8 bytes ) 15/05/11 18:48:37 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 112 bytes ) 15/05/11 18:48:37 ii : DPD ARE-YOU-THERE sequence 37a1584d requested 15/05/11 18:48:37 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 84 bytes ) 15/05/11 18:48:37 DB : phase1 found 15/05/11 18:48:37 ii : processing informational packet ( 84 bytes ) 15/05/11 18:48:37 == : new informational iv ( 8 bytes ) 15/05/11 18:48:37 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:37 =< : message 6a1cc8af 15/05/11 18:48:37 =< : decrypt iv ( 8 bytes ) 15/05/11 18:48:37 == : decrypt packet ( 84 bytes ) 15/05/11 18:48:37 <= : trimmed packet padding ( 4 bytes ) 15/05/11 18:48:37 <= : stored iv ( 8 bytes ) 15/05/11 18:48:37 << : hash payload 15/05/11 18:48:37 << : notification payload 15/05/11 18:48:37 == : informational hash_i ( computed ) ( 16 bytes ) 15/05/11 18:48:37 == : informational hash_c ( received ) ( 16 bytes ) 15/05/11 18:48:37 ii : informational hash verified 15/05/11 18:48:37 ii : received peer DPDV1-R-U-THERE-ACK notification 15/05/11 18:48:37 ii : - 10.90.3.25:500 -> 10.90.3.53:500 15/05/11 18:48:37 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:37 ii : - data size 4 15/05/11 18:48:37 ii : DPD ARE-YOU-THERE-ACK sequence 37a1584d accepted 15/05/11 18:48:37 ii : next tunnel DPD request in 15 secs for peer 10.90.3.25:500 15/05/11 18:48:42 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 92 bytes ) 15/05/11 18:48:42 DB : phase1 found 15/05/11 18:48:42 ii : processing config packet ( 92 bytes ) 15/05/11 18:48:42 DB : config found 15/05/11 18:48:42 !! : config packet ignored ( config already mature ) 15/05/11 18:48:52 DB : phase1 found 15/05/11 18:48:52 ii : sending peer DPDV1-R-U-THERE notification 15/05/11 18:48:52 ii : - 10.90.3.53:500 -> 10.90.3.25:500 15/05/11 18:48:52 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:52 ii : - data size 4 15/05/11 18:48:52 >> : hash payload 15/05/11 18:48:52 >> : notification payload 15/05/11 18:48:52 == : new informational hash ( 16 bytes ) 15/05/11 18:48:52 == : new informational iv ( 8 bytes ) 15/05/11 18:48:52 >= : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:52 >= : message 6cc0e7e9 15/05/11 18:48:52 >= : encrypt iv ( 8 bytes ) 15/05/11 18:48:52 == : encrypt packet ( 80 bytes ) 15/05/11 18:48:52 == : stored iv ( 8 bytes ) 15/05/11 18:48:52 -> : send IKE packet 10.90.3.53:500 -> 10.90.3.25:500 ( 112 bytes ) 15/05/11 18:48:52 ii : DPD ARE-YOU-THERE sequence 37a1584e requested 15/05/11 18:48:52 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 84 bytes ) 15/05/11 18:48:52 DB : phase1 found 15/05/11 18:48:52 ii : processing informational packet ( 84 bytes ) 15/05/11 18:48:52 == : new informational iv ( 8 bytes ) 15/05/11 18:48:52 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:52 =< : message 8e227bc2 15/05/11 18:48:52 =< : decrypt iv ( 8 bytes ) 15/05/11 18:48:52 == : decrypt packet ( 84 bytes ) 15/05/11 18:48:52 <= : trimmed packet padding ( 4 bytes ) 15/05/11 18:48:52 <= : stored iv ( 8 bytes ) 15/05/11 18:48:52 << : hash payload 15/05/11 18:48:52 << : notification payload 15/05/11 18:48:52 == : informational hash_i ( computed ) ( 16 bytes ) 15/05/11 18:48:52 == : informational hash_c ( received ) ( 16 bytes ) 15/05/11 18:48:52 ii : informational hash verified 15/05/11 18:48:52 ii : received peer DPDV1-R-U-THERE-ACK notification 15/05/11 18:48:52 ii : - 10.90.3.25:500 -> 10.90.3.53:500 15/05/11 18:48:52 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:52 ii : - data size 4 15/05/11 18:48:52 ii : DPD ARE-YOU-THERE-ACK sequence 37a1584e accepted 15/05/11 18:48:52 ii : next tunnel DPD request in 15 secs for peer 10.90.3.25:500 15/05/11 18:48:52 <- : recv IKE packet 10.90.3.25:500 -> 10.90.3.53:500 ( 76 bytes ) 15/05/11 18:48:52 DB : phase1 found 15/05/11 18:48:52 ii : processing informational packet ( 76 bytes ) 15/05/11 18:48:52 == : new informational iv ( 8 bytes ) 15/05/11 18:48:52 =< : cookies 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:52 =< : message 55b73f7b 15/05/11 18:48:52 =< : decrypt iv ( 8 bytes ) 15/05/11 18:48:52 == : decrypt packet ( 76 bytes ) 15/05/11 18:48:52 <= : stored iv ( 8 bytes ) 15/05/11 18:48:52 << : hash payload 15/05/11 18:48:52 << : delete payload 15/05/11 18:48:52 == : informational hash_i ( computed ) ( 16 bytes ) 15/05/11 18:48:52 == : informational hash_c ( received ) ( 16 bytes ) 15/05/11 18:48:52 ii : informational hash verified 15/05/11 18:48:52 ii : received peer DELETE message 15/05/11 18:48:52 ii : - 10.90.3.25:500 -> 10.90.3.53:500 15/05/11 18:48:52 ii : - isakmp spi = 9df94f78a0172701:c4e5180cb5e53d35 15/05/11 18:48:52 DB : phase1 found 15/05/11 18:48:52 ii : cleanup, marked phase1 9df94f78a0172701:c4e5180cb5e53d35 for removal 15/05/11 18:48:52 DB : phase1 soft event canceled ( ref count = 4 ) 15/05/11 18:48:52 DB : phase1 hard event canceled ( ref count = 3 ) 15/05/11 18:48:52 DB : phase1 dead event canceled ( ref count = 2 ) 15/05/11 18:48:52 DB : config deleted ( obj count = 0 ) 15/05/11 18:48:52 ii : phase1 removal before expire time 15/05/11 18:48:52 DB : phase1 not found 15/05/11 18:48:52 DB : phase1 deleted ( obj count = 0 ) 15/05/11 18:48:52 DB : policy found 15/05/11 18:48:52 ii : removing IPSEC INBOUND policy ANY:0.0.0.0/0:* -> ANY:44.128.0.11:* 15/05/11 18:48:52 K> : send pfkey X_SPDDELETE2 UNSPEC message 15/05/11 18:48:52 K< : recv pfkey X_SPDDELETE2 UNSPEC message 15/05/11 18:48:52 DB : policy found 15/05/11 18:48:52 ii : removing IPSEC OUTBOUND policy ANY:44.128.0.11:* -> ANY:0.0.0.0/0:* 15/05/11 18:48:52 K> : send pfkey X_SPDDELETE2 UNSPEC message 15/05/11 18:48:52 ii : removed IPSEC policy route for ANY:0.0.0.0/0:* 15/05/11 18:48:52 DB : policy found 15/05/11 18:48:52 ii : removing NONE INBOUND policy ANY:10.90.3.25:* -> ANY:10.90.3.53:* 15/05/11 18:48:52 K> : send pfkey X_SPDDELETE2 UNSPEC message 15/05/11 18:48:52 DB : policy found 15/05/11 18:48:52 ii : removing NONE OUTBOUND policy ANY:10.90.3.53:* -> ANY:10.90.3.25:* 15/05/11 18:48:52 K> : send pfkey X_SPDDELETE2 UNSPEC message 15/05/11 18:48:52 ii : removed NONE policy route for ANY:10.90.3.25:* 15/05/11 18:48:52 DB : policy found 15/05/11 18:48:52 DB : policy deleted ( obj count = 7 ) 15/05/11 18:48:52 K< : recv pfkey X_SPDDELETE2 UNSPEC message 15/05/11 18:48:52 DB : policy found 15/05/11 18:48:52 DB : policy deleted ( obj count = 6 ) 15/05/11 18:48:52 K< : recv pfkey X_SPDDELETE2 UNSPEC message 15/05/11 18:48:52 DB : policy found 15/05/11 18:48:52 DB : policy deleted ( obj count = 5 ) 15/05/11 18:48:52 K< : recv pfkey X_SPDDELETE2 UNSPEC message 15/05/11 18:48:52 DB : policy found 15/05/11 18:48:52 DB : policy deleted ( obj count = 4 ) 15/05/11 18:48:52 ii : closed tap device tap0 15/05/11 18:48:52 DB : tunnel dpd event canceled ( ref count = 3 ) 15/05/11 18:48:52 DB : tunnel stats event canceled ( ref count = 2 ) 15/05/11 18:48:52 DB : removing tunnel config references 15/05/11 18:48:52 DB : removing tunnel phase2 references 15/05/11 18:48:52 DB : phase2 soft event canceled ( ref count = 2 ) 15/05/11 18:48:52 DB : phase2 hard event canceled ( ref count = 1 ) 15/05/11 18:48:52 DB : phase1 not found 15/05/11 18:48:52 K> : send pfkey DELETE ESP message 15/05/11 18:48:52 K> : send pfkey DELETE ESP message 15/05/11 18:48:52 K< : recv pfkey DELETE ESP message 15/05/11 18:48:52 ii : phase2 removal before expire time 15/05/11 18:48:52 K< : recv pfkey DELETE ESP message 15/05/11 18:48:52 DB : phase2 deleted ( obj count = 0 ) 15/05/11 18:48:52 DB : removing tunnel phase1 references 15/05/11 18:48:52 DB : tunnel deleted ( obj count = 0 ) 15/05/11 18:48:52 DB : removing all peer tunnel references 15/05/11 18:48:52 DB : peer deleted ( obj count = 0 ) 15/05/11 18:48:52 ii : ipc client process thread exit ...